基于多项式插值的多部门限秘密共享方案
Multipartie Threshold Secret Sharing Scheme Based on Polynomial Interpolation
摘要: 在门限秘密共享方案中,一个参与者集合是否能恢复主秘密,取决于参与重构的参与者数量。在某种情况下,仅由一组参与者就能恢复主秘密,权限会相对过于集中。为了避免该问题,本文将一个大集合的参与者划分为几个不相交分区,每个分区都有一个独立部分访问结构;只有满足所有部分访问结构的参与者集合,才能恢复主秘密,否则得不到主秘密的任何信息。基于Shamir门限秘密共享方案和自由群中短词排序,本文构造了新的多部门限秘密共享方案,该方案可实现主秘密的动态更新,避免主秘密改变时分发阶段的通信需求,使整个方案在更新主秘密时更加高效。
Abstract: In the threshold secret sharing scheme, whether a set of participants can recover the secret de-pends on the number of participants participating in the reconstruction. In some cases, only one group of participants can recover the secret, and the authority will be relatively centralized. To avoid this problem, the participants of a large set are divided into several disjoint partitions, each partition has an independent part access structure; only the set of participants meeting all partial access structures can recover the secret, otherwise no information of the secret can be obtained. Based on Shamir threshold secret sharing scheme and shortlex order in the free group, this paper constructs a new multipart threshold secret sharing scheme. This scheme can realize the dynamic update of the secret, avoid the communication requirements of the time transmission phase when the secret changes, and make the whole scheme more efficient when updating the main secret.
文章引用:林苇婷, 林昌露. 基于多项式插值的多部门限秘密共享方案[J]. 理论数学, 2022, 12(12): 2124-2132. https://doi.org/10.12677/PM.2022.1212228

参考文献

[1] Shamir, A. (1979) How to Share a Secret. Communications of the ACM, 22, 612-613. [Google Scholar] [CrossRef
[2] Blakley, G.R. (1979) Safeguarding Cryptographic Keys. International Workshop on Managing Requirements Knowledge, New York, 4-7 June 1979, 313-313. [Google Scholar] [CrossRef
[3] Miao, F., Yu, Y., Meng, K., et al. (2021) Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem. Security and Com-munication Networks, 2021, Article ID: 6678345. [Google Scholar] [CrossRef
[4] Subrahmanyam, R., Rukma Rekha, N. and Subba Rao, Y.V. (2022) Multipartite Verifiable Secret Sharing Based on CRT. In: Smys, S., et al., Eds., Computer Networks and Inventive Communication Technologies, Springer, Singapore, 233-245. [Google Scholar] [CrossRef
[5] Shima, K. and Doi, H. (2018) A Hierarchical Secret Sharing Scheme Based on Information Dispersal Techniques. In: Lee, K., Ed., International Conference on Information Security and Cryptology-ICISC 2018, Springer, Cham, 217-232. [Google Scholar] [CrossRef
[6] Tochikubo, K. (2019) General Secret Sharing Schemes Using Hierarchical Threshold Scheme. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 102, 1037-1047. [Google Scholar] [CrossRef
[7] Ding, J., Lin, C. and Lin, F. (2020) Optimal Threshold Changeable Secret Sharing with New Threshold Change Range. In: Nguyen, K., et al., Eds., International Conference on Provable Security 2020, Springer, Cham, 361-378. [Google Scholar] [CrossRef
[8] Harn, L., Hsu, C. and Xia, Z. (2022) A Novel Threshold Changeable Secret Sharing Scheme. Frontiers of Computer Science, 16, Article ID: 161807. [Google Scholar] [CrossRef
[9] Farràs, O., Martí-Farré, J. and Padró, C. (2012) Ideal Multipartite Secret Sharing Schemes. Journal of Cryptology, 25, 434-463. [Google Scholar] [CrossRef
[10] Simmons, G.J. (1988) How to (Really) Share a Secret. In: Goldwasser, S., Ed., Advances in Cryptology—CRYPTO’88, Springer, Cham, 390-448. [Google Scholar] [CrossRef
[11] Brickell, E.F. (1989) Some Ideal Secret Sharing Schemes. In: Quisquater, J.-J. and Vandewalle, J., Eds., Advances in Cryptology—EUROCRYPT ’89, Springer, Cham , 468-475. [Google Scholar] [CrossRef
[12] Tassa, T. (2007) Hierarchical Threshold Secret Sharing. Journal of Cryptology, 20, 237-264. [Google Scholar] [CrossRef
[13] Hsu, C.F. and Harn, L. (2014) Multipartite Secret Sharing Based on CRT. Wireless Personal Communications, 78, 271-282. [Google Scholar] [CrossRef
[14] Harsha, P., Chanakya, P. and Vadlamudi, C.V. (2018) A Reusa-ble Multipartite Secret Sharing Scheme Based on Super Increasing Sequence. International Journal of Network Security, 20, 527-535.
[15] Chen, Q., Tang, C. and Lin, Z. (2019) Efficient Explicit Constructions of Compartmented Secret Sharing Schemes. Designs, Codes and Cryptography, 87, 2913-2940. [Google Scholar] [CrossRef
[16] Chen, Q., Tang, C. and Lin, Z. (2021) Efficient Explicit Con-structions of Multipartite Secret Sharing Schemes. IEEE Transactions on Information Theory, 68, 601-631. [Google Scholar] [CrossRef
[17] Xu, G., Yuan, J., Xu, G., et al. (2021) A New Multi-Stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier. Information Technology and Control, 50, 236-246. [Google Scholar] [CrossRef
[18] Shannon, C.E. (1948) A Mathematical Theory of Communication. The Bell System Technical Journal, 27, 379-423. [Google Scholar] [CrossRef
[19] Cohen, H. (1993) A Course in Computational Algebraic Number Theory. Springer, Berlin. [Google Scholar] [CrossRef
[20] 丘维声. 抽象代数基础[M]. 第2版. 北京: 高等教育出版社, 2015: 75-81.
[21] Cavallo, B. and Kahrobaei, D. (2015) Secret Sharing Using Non-Commutative Groups and the Shortlex Order. Contemporary Mathematics, 633, 1-8. [Google Scholar] [CrossRef